computer forensics specialists

Discovery, Depositions and Findings

We had a Client, James who started and built a booming business with his longtime friend, Bill. Bill was outgoing, charismatic while James was more laid back and book smart, while both had the desire and knowledge to start a company. For years, growing up, through high school and college, they knew they wanted to work for themselves, didn’t want to report to a boss, wanted to have choices and full control over their own destiny and livelihood.

After graduating with degrees in two different fields, they merged their knowledge and started a much needed consulting business in their hometown, just 30 minutes outside of Indianapolis. Twenty years later, they had talked about selling the business someday to spend more time with their families and [...]

Is the Purchase of a Smartwatch Setting You up for Digital Forensics Services?

Who do you know with one of the smart, sleek, new smartwatches? Ohhh. So Cool! And so vulnerable to hacking. More so than a smartphone or a tablet.

Why?

A recent article in the Christian Post explains. According to a recent study by Dr. Frank Breitinger, associate director of the University of New Haven Cyber Forensics Research and Education Group in Connecticut, there is a “lack of encryption and an unsecure authentication system” in all the smartwatches they tested.

In the study they tried to infiltrate the devices to get a variety of information such as emails, calendars, messages, health, fitness and financial data. In all cases, if the information was on the device, they were able to get it!

Computer forensics experts like those at International Investigators [...]

Do You Think Computer Forensics Conjures Up the Past Like Magic?

Computer forensics is not magic, in fact it is very technical in nature and can be very exacting. People always wonder how the computer forensics experts at International Investigators can “conjure” up “stuff” from computers that the owners thought was gone. How does forensics data recovery work?

When it comes to files, forensic computer investigations and computer forensic analysis works from a three-pronged approach.

The first is to recover files as we users know them. For example, a Word document or an Excel worksheet or workbook. These are files that openly exist on the computer. These are not files the user thinks has been deleted or removed. Although some of those could exist in their original form in the recycle or trash folders.
The second is the [...]

Computer Forensics Done Right – or not at all

Recently the Department of Justice issued a US search warrant to Microsoft in regard to emails sent from an Ireland-based subscriber. According to an article in the Guardian, “The United States government has the right to demand the emails of anyone in the world from any email provider headquartered within US borders, Department of Justice (DoJ) lawyers told a federal appeals court…)

While they argue the case in court with Microsoft contending that the DoJ has exceeded its authority, computer forensics firms here in the US are legally bound to obtain permission from device owners and to follow a legal process for cell records in digital forensics investigations.

Some may believe that computer forensics investigations are done in the shadows. That may appear to be the [...]

Is it Employee Embezzlement?

A very depressed-looking business owner came in for an appointment at International Investigators. We are accustomed to clients or prospective clients arriving emotionally charged, either very angry or hurt, but they don’t usually act like this gentleman.

Once talking, he explained that he was “darn near just ready to chuck it all in.” He said he was just confounded by what he knew was going on in his company. He just needed proof of it and confirmation of how deep the damage went.

Whew. He explained that because his company dealt with many clients coming in for training from out of town, he maintained an apartment for their use doing their stay. It was fully furnished and maintained. What he had discovered was that it had [...]

Are You Being Victimized By Corporate Espionage?

According to a recent article on CNN, the head of the FBI’s counterintelligence division, Randall Coleman said that the bureau has seen a 53% increase in economic espionage cases. To warn and educate industry leaders, the FBI has launched a nationwide campaign.

In the article, Bill Evanina, head of the National Counterintelligence and Security Center, said, “Economic security is national security.” There is growing evidence of threats from several different nations, which is part of the concern from the government agencies.

Three scenarios highlight the types of situations of corporate espionage:

Insider Threats. This is a situation where individuals who are familiar with the inner workings of a company or products are recruited by outside organizations. Sometimes these individuals actually “spy” on the company and continue on [...]

Stalker Outed with Digital Forensics and Surveillance

After dealing with the very bizarre behavior of a scorned lover in another state, our female client called International Investigators. Although she had relocated, she was scared because she knew he had found her.

In her previous home, the man had stalked her; repeatedly calling her house and following her around. She had tried several times to seek assistance from law enforcement officers but was told that they could do nothing to help her. Not until a crime was committed. And by then, of course, it would be too late to protect herself.

In an attempt to protect herself, the woman moved out of state. She changed her cell phone number. Only family members and a handful of close friends knew her whereabouts. But now weird [...]

Are You Putting Your Computer at Risk?

Recent allegations that an Arkansas police department shared “malicious software” with a defense attorney in an attempt to infiltrate his computer and disrupt his work, brings something to mind that is important for business people and companies to know. The attorney demands that a computer forensic investigation be undertaken by a computer forensic expert. It’s a shocking allegation, and the only way to determine if it’s true is to do a forensic computer analysis.

It’s not just shocking, as computer forensic investigators here at International Investigators, we have to spread the word that it is so easy to be victimized in this way. Any time you accept something into your computer system, you are taking a chance. And I mean anything:

Disruptive Computer Hacking on the Rise

Everyone knows that businesses face risks from cyber threats. However, what isn’t realized is that the risk isn’t just a problem for BIG business, it’s a problem for EVERY business.

As leaders in computer forensic investigation and experience as spyware detectors and spyware removers, the computer forensics experts at International Investigators can tell you that the Allianz Risk Barometer 2015 is accurate in reporting that disruptive scenarios are increasing in number.

The point they want to make is that risk management must reflect this new reality and we agree.

Attacks made on servers and systems to infiltrate and steal information and data are still a prime concern, but that is not the only scenario that computer forensics companies are being called in to address.

Is Using Surveillance Equipment Good or Bad?

If you watch TV at all, you hear continual references to closed circuit TV. In fact, if you spend time in the UK or other European countries you will see them everywhere. We realize that makes some people feel uneasy, but there are two sides to surveillance equipment.

The Crime Prevention Side of Surveillance Equipment

Not sure if I should call it crime prevention because it only seems to deter those who respect the law to begin with, but cameras can be installed inside and around public space and places of business to:

Record evidence of theft and other wrongdoing such as vandalism. Authorities routinely use CC TV recordings to identify robbers and submit images to the public for help in apprehending the perpetrators. Employers often install [...]